This vulnerability allows remote attackers to execute arbitrary code on affected installations of Apple macOS. Authentication is not required to exploit this vulnerability.
Published August 15, 2022.
Apple Mac OS X